Added comprehensive email configuration to enable notifications for password resets, user invitations, system alerts, and backup failures. **Services configured:** - **Vaultwarden** (vault/compose.yaml): - SMTP settings for password resets, 2FA, emergency access emails - Uses IONOS SMTP with force_tls security - Sender: hi@pivoine.art - **Linkwarden** (links/compose.yaml): - Email server configuration for user invitations - Password reset functionality via email - Uses smtp:// connection string format - **n8n** (n8n/compose.yaml): - SMTP mode enabled for workflow notifications - User invitation emails - Password reset support - SSL-secured connection - **Netdata** (netdata/compose.yaml, health_alarm_notify.conf, msmtprc): - Health alarm notifications via email - MSMTP configuration for sending alerts - Notifications sent to valknar@pivoine.art - Alerts for system issues, resource exhaustion, service failures **Common SMTP settings** (from .env): - Provider: IONOS (smtp.ionos.de:465) - From address: hi@pivoine.art - Transport: SMTP with TLS/SSL - Admin email: valknar@pivoine.art **Backrest notifications:** - Configured via web UI at restic.pivoine.art - Supports webhooks to Gotify for push notifications - Email notifications can be added through UI settings All services now have proper email notification capabilities for improved monitoring, user management, and security features. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
47 lines
2.2 KiB
YAML
47 lines
2.2 KiB
YAML
services:
|
|
vaultwarden:
|
|
image: ${VAULT_IMAGE:-vaultwarden/server:latest}
|
|
container_name: ${VAULT_COMPOSE_PROJECT_NAME}_app
|
|
restart: unless-stopped
|
|
volumes:
|
|
- vaultwarden_data:/data
|
|
environment:
|
|
TZ: ${TIMEZONE:-Europe/Berlin}
|
|
DOMAIN: https://${VAULT_TRAEFIK_HOST}
|
|
WEBSOCKET_ENABLED: ${VAULT_WEBSOCKET_ENABLED:-true}
|
|
SIGNUPS_ALLOWED: ${VAULT_SIGNUPS_ALLOWED:-false}
|
|
INVITATIONS_ALLOWED: ${VAULT_INVITATIONS_ALLOWED:-true}
|
|
SHOW_PASSWORD_HINT: ${VAULT_SHOW_PASSWORD_HINT:-false}
|
|
SMTP_HOST: ${EMAIL_SMTP_HOST}
|
|
SMTP_FROM: ${EMAIL_FROM}
|
|
SMTP_FROM_NAME: Vaultwarden
|
|
SMTP_SECURITY: force_tls
|
|
SMTP_PORT: ${EMAIL_SMTP_PORT}
|
|
SMTP_USERNAME: ${EMAIL_SMTP_USER}
|
|
SMTP_PASSWORD: ${EMAIL_SMTP_PASSWORD}
|
|
networks:
|
|
- compose_network
|
|
labels:
|
|
- 'traefik.enable=${VAULT_TRAEFIK_ENABLED}'
|
|
- 'traefik.http.middlewares.${VAULT_COMPOSE_PROJECT_NAME}-redirect-web-secure.redirectscheme.scheme=https'
|
|
- 'traefik.http.routers.${VAULT_COMPOSE_PROJECT_NAME}-web.middlewares=${VAULT_COMPOSE_PROJECT_NAME}-redirect-web-secure'
|
|
- 'traefik.http.routers.${VAULT_COMPOSE_PROJECT_NAME}-web.rule=Host(`${VAULT_TRAEFIK_HOST}`)'
|
|
- 'traefik.http.routers.${VAULT_COMPOSE_PROJECT_NAME}-web.entrypoints=web'
|
|
- 'traefik.http.routers.${VAULT_COMPOSE_PROJECT_NAME}-web-secure.rule=Host(`${VAULT_TRAEFIK_HOST}`)'
|
|
- 'traefik.http.routers.${VAULT_COMPOSE_PROJECT_NAME}-web-secure.tls.certresolver=resolver'
|
|
- 'traefik.http.routers.${VAULT_COMPOSE_PROJECT_NAME}-web-secure.entrypoints=web-secure'
|
|
- 'traefik.http.middlewares.${VAULT_COMPOSE_PROJECT_NAME}-web-secure-compress.compress=true'
|
|
- 'traefik.http.routers.${VAULT_COMPOSE_PROJECT_NAME}-web-secure.middlewares=${VAULT_COMPOSE_PROJECT_NAME}-web-secure-compress'
|
|
- 'traefik.http.services.${VAULT_COMPOSE_PROJECT_NAME}-web-secure.loadbalancer.server.port=80'
|
|
- 'traefik.docker.network=${NETWORK_NAME}'
|
|
- 'com.centurylinklabs.watchtower.enable=${WATCHTOWER_LABEL_ENABLE}'
|
|
|
|
volumes:
|
|
vaultwarden_data:
|
|
name: ${VAULT_COMPOSE_PROJECT_NAME}_data
|
|
|
|
networks:
|
|
compose_network:
|
|
name: ${NETWORK_NAME}
|
|
external: true
|